Y Wang, M Li, S Luo, Y Xin, H Zhu,
Y Chen… - IEEE …, 2019 - ieeexplore.ieee.org
Trajectory k-anonymity is a prevalent technique for protecting trajectory privacy. However,
the existing techniques for generating fake trajectories can be easily broken by an adversary …